D-Link NASµÄí§ÒâÏÂÁî×¢ÈëºÍÓ²±àÂëºóÃÅ
Ðû²¼Ê±¼ä 2024-04-084ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬£¬ÍþвÑо¿Ö°Ô±Åû¶Á˶à¸ö²»ÔÚÖ§³ÖµÄ D-Link ÍøÂ總¼Ó´æ´¢ (NAS) ×°±¸ÐͺÅÖб£´æÐµÄí§ÒâÏÂÁî×¢ÈëºÍÓ²±àÂëºóÃÅȱÏÝ¡£¡£¡£¡£¡£¡£¡£¸ÃÎÊÌâ±£´æÓÚ¡°/cgi-bin/nas_sharing.cgi¡±¾ç±¾ÖУ¬£¬£¬£¬£¬£¬£¬Ó°ÏìÆä HTTP GET ÇëÇó´¦Öóͷ£³ÌÐò×é¼þ¡£¡£¡£¡£¡£¡£¡£µ¼Ö¸ÃȱÏÝ£¨±àºÅΪ CVE-2024-3273£©µÄÁ½¸öÖ÷ÒªÎÊÌâÊÇͨ¹ýÓ²±àÂëÕÊ»§£¨Óû§Ãû£º¡°messagebus¡±ºÍ¿ÕÃÜÂ룩´Ù³ÉµÄºóÃÅÒÔ¼°Í¨¹ý¡°system¡±²ÎÊýµÄÏÂÁî×¢ÈëÎÊÌâ¡£¡£¡£¡£¡£¡£¡£ÏÂÁî×¢ÈëȱÏÝÊÇÓÉÓÚͨ¹ý HTTP GET ÇëÇó½« Base64 ±àÂëµÄÏÂÁîÌí¼Óµ½¡°system¡±²ÎÊý£¬£¬£¬£¬£¬£¬£¬È»ºóÖ´ÐиÃÏÂÁî¶øÒýÆðµÄ¡£¡£¡£¡£¡£¡£¡£D-LinkΪ¾É×°±¸½¨ÉèÁË ×¨ÃŵÄÖ§³ÖÒ³Ãæ £¬£¬£¬£¬£¬£¬£¬Óû§¿ÉÒÔÔÚÆäÖÐä¯ÀÀµµ°¸ÒÔ²éÕÒ×îеÄÇå¾²ºÍ¹Ì¼þ¸üС£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/over-92-000-exposed-d-link-nas-devices-have-a-backdoor-account/
2. Áè¼Ý1.6Íò¸öIVANTI VPNÈÔÈ»Ò×Êܵ½CVE-2024-21894µÄ¹¥»÷
https://securityaffairs.com/161544/security/ivanti-16500-vulnerable-istances.html
3. ÃÀ¹úÎÀÉú²¿ÖÒÑÔÒ½Ôº IT ЧÀĮ́Ò×Ôâµ½ºÚ¿Í¹¥»÷
4ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬£¬ÃÀ¹úÎÀÉúÓ빫ÖÚЧÀͲ¿ (HHS) ÖÒÑԳƣ¬£¬£¬£¬£¬£¬£¬ºÚ¿ÍÏÖÔÚÕýÔÚʹÓÃÉç»á¹¤³ÌÕ½ÂÔÀ´¹¥»÷Ò½ÁƱ£½¡ºÍ¹«¹²ÎÀÉú (HPH) ÁìÓòµÄ IT ЧÀĮ́¡£¡£¡£¡£¡£¡£¡£ÎÀÉú²¿·ÖÍøÂçÇ徲е÷ÖÐÐÄ (HC3) ±¾ÖÜÐû²¼µÄ²¿·Ö¾¯±¨³Æ£¬£¬£¬£¬£¬£¬£¬ÕâЩսÂÔÔÊÐí¹¥»÷Õßͨ¹ý×¢²á×Ô¼ºµÄ¶àÖØÉí·ÝÑéÖ¤ (MFA) ×°±¸À´»á¼ûÄ¿µÄ×éÖ¯µÄϵͳ¡£¡£¡£¡£¡£¡£¡£ÔÚÕâЩ¹¥»÷ÖУ¬£¬£¬£¬£¬£¬£¬ÍþвÐÐΪÕßʹÓÃÍâµØÇøÓò´úÂëÖµçð³ä²ÆÎñ²¿·ÖÔ±¹¤µÄ×éÖ¯£¬£¬£¬£¬£¬£¬£¬²¢ÌṩÇÔÈ¡µÄÉí·ÝÑéÖ¤ÏêϸÐÅÏ¢£¬£¬£¬£¬£¬£¬£¬°üÀ¨¹«Ë¾ ID ºÍÉç»áÇå¾²ºÅÂë¡£¡£¡£¡£¡£¡£¡£ËûÃÇʹÓÃÕâЩÃô¸ÐÐÅÏ¢²¢Éù³Æ×Ô¼ºµÄÖÇÄÜÊÖ»úÒÑË𻵣¬£¬£¬£¬£¬£¬£¬Ëµ·þ IT ×ÊÖų́ÔÚ¹¥»÷ÕߵĿØÖÆÏÂÔÚ MFA ÖÐ×¢²áÐÂ×°±¸¡£¡£¡£¡£¡£¡£¡£ÕâʹËûÃÇÄܹ»»á¼û¹«Ë¾×ÊÔ´£¬£¬£¬£¬£¬£¬£¬²¢ÔÊÐíËûÃÇÔÚÉÌÒµµç×ÓÓʼþй¶¹¥»÷ÖÐÖØ¶¨ÏòÒøÐÐÉúÒâ¡£¡£¡£¡£¡£¡£¡£
https://www.bleepingcomputer.com/news/security/us-health-dept-warns-hospitals-of-hackers-targeting-it-help-desks/
4. ÒÔÉ«ÁÐ˾·¨²¿Ôںڿͻ·Ö×ÓÉù³ÆÈëÇÖºóÉó²éÍøÂçÊÂÎñ
4ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬£¬ ÒÔÉ«ÁÐ˾·¨²¿ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÕýÔÚÊÓ²ìÒ»ÆðÍøÂçÊÂÎñ£¬£¬£¬£¬£¬£¬£¬¹æÄ£ÈÔÔÚÉó²éÖУ¬£¬£¬£¬£¬£¬£¬ÐèҪʱ¼äÀ´¼ì²éй¶ÎļþµÄÄÚÈݺ͹æÄ£¼°ÆäȪԴ¡£¡£¡£¡£¡£¡£¡£Ò»¸öÃûΪ Anonymous for Justice µÄ×éÖ¯Éù³Æ¶Ô´Ë´Îй¶ÈÏÕæ£¬£¬£¬£¬£¬£¬£¬²¢³Æ´Ë´Îй¶°üÀ¨¼ìË÷½ü 300 GB µÄÊý¾Ý¡£¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯ÔÚÆäÍøÕ¾ÉÏÌåÏÖ£¬£¬£¬£¬£¬£¬£¬½«¼ÌÐø¹¥»÷ÒÔÉ«ÁУ¬£¬£¬£¬£¬£¬£¬¡°Ö±µ½¼ÓɳսÕù×èÖ¹¡±¡£¡£¡£¡£¡£¡£¡£¸Ã×éÖ¯Ðû²¼Á˾ݳÆÔÚ¹¥»÷»î¶¯ÖлñµÃµÄÎļþ£¬£¬£¬£¬£¬£¬£¬ÀýÈçÖ´·¨Îļþ£¬£¬£¬£¬£¬£¬£¬°üÀ¨±ê¼ÇΪÉñÃØµÄË«±ßÐæÅºÍÌõÔ¼²Ý°¸¡£¡£¡£¡£¡£¡£¡£Â·Í¸ÉçÎÞ·¨×ÔÁ¦ºËʵй¶ÎļþµÄÕæÊµÐÔ¡£¡£¡£¡£¡£¡£¡£Ë¾·¨²¿ÔÚÌû×ÓÖÐÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ÒÑÕë¶ÔÕâÖÖÇéÐÎÌáǰ×öºÃ×¼±¸£¬£¬£¬£¬£¬£¬£¬²¢ÇÒÆäÐж¯²»»áÖÐÖ¹¡£¡£¡£¡£¡£¡£¡£¹ú¼ÒÍøÂç¾Ö±¾ÖÜÔçЩʱ¼äÌåÏÖ£¬£¬£¬£¬£¬£¬£¬Ô¤¼ÆÒÁÀÊÄê¶ÈÊ¥³ÇÈÕÖÜÄ©µÄÍøÂç¹¥»÷ʵÑ齫»áÔöÌí¡£¡£¡£¡£¡£¡£¡£
https://www.reuters.com/world/middle-east/israels-justice-ministry-reviewing-cyber-incident-after-hacktivists-claim-breach-2024-04-05/
5. ÈÕ±¾ Hoya µÄ IT ϵͳÔâÊܹ¥»÷ºóÔÝÍ£Éú²ú
4ÔÂ5ÈÕ£¬£¬£¬£¬£¬£¬£¬ÈÕ±¾µÄ Hoya¡ª¡ªÒ»¼ÒÑÛ¾µºÍÒþÐÎÑÛ¾µÖÆÔìÉÌ£¬£¬£¬£¬£¬£¬£¬ÒÔ¼°ÓÃÓÚÖÆÔì°ëµ¼ÌåÖÆÔ졢ƽ°åÏÔʾÆ÷ºÍÓ²ÅÌÇý¶¯Æ÷µÄÌ×¼þ¡ª¡ª IT ϵͳÔâÊܹ¥»÷ºó£¬£¬£¬£¬£¬£¬£¬¸Ã¹«Ë¾ÒÑ×èÖ¹²¿Ñ§Éú²úºÍÏúÊۻ¡£¡£¡£¡£¡£¡£¡£¹Ù·½¶ÔËù±¬·¢ÊÂÎñµÄ¿´·¨ÊÇÄ£ºýµÄ¡£¡£¡£¡£¡£¡£¡£¸Ã¹«Ë¾ÔÊÐí¡°½«½ÓÄɲ½·¥»Ö¸´Éú²úºÍÏúÊۻËùÐèµÄϵͳ£¬£¬£¬£¬£¬£¬£¬²¢¾¡¿ì»Ö¸´Ïò¿Í»§Ìṩ²úÆ·µÄ¹©Ó¦ÏµÍ³¡±¡£¡£¡£¡£¡£¡£¡£Hoya ÏÖÔÚÉв»ÇåÎú¡°¹«Ë¾³ÖÓеÄÉñÃØ»òСÎÒ˽¼ÒÐÅÏ¢ÊÇ·ñÒѱ»Ð¹Â¶»ò±»µÚÈý·½»á¼û¡±£¬£¬£¬£¬£¬£¬£¬²¢ÖÒÑԳơ°ÖÜÈ«ÆÊÎöÔ¤¼ÆÐèÒªÏ൱³¤µÄʱ¼ä¡±¡£¡£¡£¡£¡£¡£¡£
https://www.theregister.com/2024/04/05/hoya_infosec_incident/
6. ºÚ¿ÍʹÓà Magento Îó²îÇÔÈ¡µç×ÓÉÌÎñÍøÕ¾Ö§¸¶Êý¾Ý
4ÔÂ6ÈÕ£¬£¬£¬£¬£¬£¬£¬¸Ã¹¥»÷ʹÓÃÁËCVE-2024-20720£¨CVSS ÆÀ·Ö£º9.1£©£¬£¬£¬£¬£¬£¬£¬Adobe ½«ÆäÐÎòΪ¡°ÌØÊâÔªËØµÄ²»µ±Öк͡±°¸Àý£¬£¬£¬£¬£¬£¬£¬¿ÉÄÜΪí§Òâ´úÂëÖ´ÐÐÆÌÆ½õè¾¶¡£¡£¡£¡£¡£¡£¡£¹«Ë¾ÔÚ 2024 Äê 2 Ô 13 ÈÕÐû²¼µÄÇå¾²¸üÐÂÖнâ¾öÁËÕâ¸öÎÊÌâ¡£¡£¡£¡£¡£¡£¡£Sansec ÌåÏÖ£¬£¬£¬£¬£¬£¬£¬ËüÔÚÊý¾Ý¿âÖз¢Ã÷ÁËÒ»¸ö¡°È«ÐÄÉè¼ÆµÄ½á¹¹Ä£°å¡±£¬£¬£¬£¬£¬£¬£¬¸ÃÄ£°å±»ÓÃÀ´×Ô¶¯×¢Èë¶ñÒâ´úÂëÒÔÖ´ÐÐí§ÒâÏÂÁî¡£¡£¡£¡£¡£¡£¡£¹¥»÷Õß½« Magento ½á¹¹ÆÊÎöÆ÷Óë beberlei/assert °ü£¨Ä¬ÈÏ×°Öã©Á¬ÏµÆðÀ´Ö´ÐÐϵͳÏÂÁî¡£¡£¡£¡£¡£¡£¡£ÓÉÓڽṹ¿éÓë½áÕʳµÏà¹ØÁª£¬£¬£¬£¬£¬£¬£¬Òò´Ëÿµ±ÇëÇó <store>/checkout/cart ʱ¶¼»áÖ´ÐдËÏÂÁî¡£¡£¡£¡£¡£¡£¡£ÓÐÎÊÌâµÄÏÂÁîÊÇsed£¬£¬£¬£¬£¬£¬£¬ËüÓÃÓÚ²åÈëÒ»¸ö´úÂëÖ´ÐкóÃÅ£¬£¬£¬£¬£¬£¬£¬È»ºóÈÏÕæÌṩ StripeÖ§¸¶ä¯ÀÀÆ÷ÒÔ²¶»ñ²ÆÎñÐÅÏ¢²¢½«Æäй¶µ½ÁíÒ»¸öÊÜѬȾµÄ Magento ÊÐËÁ¡£¡£¡£¡£¡£¡£¡£
https://thehackernews.com/2024/04/hackers-exploit-magento-bug-to-steal.html